Internet Danger MOHAMAD AZAM BIN HASSAN MUHAMMAD SYAFIQ BIN MOHD SATA
Definition • Internet threats can come in various form or attacks • The internet can create the illusion that strangers are actually “friends” • The internet can damage your reputation
Identity Theft Internet Predator Digital Security Beach Phishing Emails Cyber Bullying Hacker and Crackers Cyber Stalking
Shared Resources vs Dedicated Resources • Shared resources refer to devices or information on a computer that can be shared or accessed by many users; eg. Accessing folders, files, printers, scanner, emails and others. • Dedicated resources refer to a direct connection between a terminal and a service, network or computer to the specific use of a speticular user.
Unethical Behavior • Using shared resources irresponsibly such as : • Downloading pirated software • Printing a lot of personal files • Storing files that have nothing to do with work such as personal photo files in the shared storage • Causing interference or obstruction to the others access to network resources such as the use of network bandwidth for downloading large files during the working hours • Using shared resources to do thing that cause impairment such as sending spam e-mails to customers
Implications of Violating The Use of Shared Resources • Breach of security • The bandwidth can be congested or overwhelmed • Increased software piracy
How To Permanently Erase Data From Your Old Computer? • First, dismantle the computer or laptop • Second, take out the hard drive • Finally, physically destroy the hard drive